Vulnerability Database

With exploit

ibm / lotus_notes_traveler

Title Severity Exploit Date Affected Version
CVE-2013-0536 High Jun 21, 2013 == 9.0
CVE-2012-4820 High Jan 11, 2013 == 8.0
== 8.0.1
== 8.0.1.2
== 8.0.1.3
== 8.5.0.0
== 8.5.0.1
== 8.5.0.2
== 8.5.1.1
== 8.5.1.2
== 8.5.1.3
== 8.5.2.1
== 8.5.3
== 8.5.3.1
== 8.5.3.2
== 8.5.3.3
== 8.5.3.3-interim_fix_1
CVE-2012-4821 High Jan 11, 2013 == 8.0
== 8.0.1
== 8.0.1.2
== 8.0.1.3
== 8.5.0.0
== 8.5.0.1
== 8.5.0.2
== 8.5.1.1
== 8.5.1.2
== 8.5.1.3
== 8.5.2.1
== 8.5.3
== 8.5.3.1
== 8.5.3.2
== 8.5.3.3
== 8.5.3.3-interim_fix_1
CVE-2012-4822 High Jan 11, 2013 == 8.0
== 8.0.1
== 8.0.1.2
== 8.0.1.3
== 8.5.0.0
== 8.5.0.1
== 8.5.0.2
== 8.5.1.1
== 8.5.1.2
== 8.5.1.3
== 8.5.2.1
== 8.5.3
== 8.5.3.1
== 8.5.3.2
== 8.5.3.3
== 8.5.3.3-interim_fix_1
CVE-2012-4823 High Jan 11, 2013 == 8.0
== 8.0.1
== 8.0.1.2
== 8.0.1.3
== 8.5.0.0
== 8.5.0.1
== 8.5.0.2
== 8.5.1.1
== 8.5.1.2
== 8.5.1.3
== 8.5.2.1
== 8.5.3
== 8.5.3.1
== 8.5.3.2
== 8.5.3.3
== 8.5.3.3-interim_fix_1
CVE-2012-4824 Medium Oct 8, 2012 == 8.5.3.1
== 8.5.3
== 8.5.3.2
== 8.5.3.3
CVE-2012-4825 Low Oct 8, 2012 == 8.5.0.0
== 8.5.2.1
== 8.5.0.2
== 8.5.1.3
== 8.5.3
<= 8.5.3.1
== 8.5.0.1
== 8.5.1.2
== 8.5.1.1
CVE-2012-5307 Low Oct 8, 2012 == 8.5.0.0
== 8.5.2.1
== 8.5.0.2
== 8.5.1.3
== 8.5.3.1
<= 8.5.3.3
== 8.5.3
== 8.5.0.1
== 8.5.1.2
== 8.5.3.2
== 8.5.1.1
CVE-2012-5308 Medium Oct 8, 2012 == 8.5.0.0
== 8.5.0.1
== 8.5.0.2
== 8.5.1.1
== 8.5.1.2
== 8.5.1.3
== 8.5.2.1
== 8.5.3
== 8.5.3.1
== 8.5.3.2
== 8.5.3.3
== 8.5.3.3-interim_fix_1
CVE-2012-5309 Medium Oct 8, 2012 == 8.5.0.0
== 8.5.0.1
== 8.5.0.2
== 8.5.1.1
== 8.5.1.2
== 8.5.1.3
== 8.5.2.1
== 8.5.3
== 8.5.3.1
== 8.5.3.2
== 8.5.3.3
== 8.5.3.3-interim_fix_1